QUESTION 1Users must be able to connect remotely from their own mobile devices.What should the architect consider to increase the security of the current authentication solution? A. Adding a second authentication factorB. Placing domain controllers in the DMZ for remote usersC. Shortening the Active Directory password expiration periodD. Populating the …

QUESTION 1A Citrix Engineer needs to enable high availability on the XenServer host.What are two requirements for the environment? (Choose two.) A. Workload Balancing has to be disabled.B. A static IP address must be set on the management interface.C. XenServer hosts need to be part of a XenServer resource pool.D. …

QUESTION 1An administrator is working to implement Storage Profiles in their environment. Which two ways can storage capabilities be generated? (Choose two.) A. They are generated by Datastore Clusters as LUNs are added to the cluster.B. They are automatically determined by the Storage Profile when it is created.C. They can …

QUESTION 1 Based on the information shown in the attached exhibit, does the XenServer host have sufficient CPU resources available? Click the Exhibit button to view a screenshot of the Performance Graphs for the XenServer host. A. The CPU resources are sufficient, and NO upgrade is required. B. The …

QUESTION 125 Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table. All client computers run either Windows 7 or Windows 8. The corporate security policy states that all of the client computers must have …

QUESTION 211You administer a Windows 8.1 Pro computer. The computer has File History turned on, and system protection turned on for drive C.You accidentally delete a folder named Libraries\Customers by using the Shift+Delete keyboard shortcut.You need to restore the most recent version of the folder to its original location.Which approach …

QUESTION 201You administer Windows 8.1 laptops. The laptops are configured to connect to an unsecured wireless access point.You plan to configure the wireless access point to encrypt wireless traffic and turn off SSID broadcast.You need to ensure the laptops will join the secured wireless network automatically after the configuration changes.What …

QUESTION 115Your network contains an Active Directory domain named contoso.com. All client computers run either Windows 7 or Windows 8. Some users work from customer locations, hotels, and remote sites. The remote sites often have firewalls that limit connectivity to the Internet.You need to recommend a VPN solution for the …

QUESTION 105 Your company has a main office, ten regional datacenters; and 100 branch offices. You are designing the site topology for an Active Directory forest named contoso.com. The forest will contain the following servers: – In each regional datacenter and in the main office, a domain controller that runs …

QUESTION 191 You connect a portable Windows 8.1 computer to a corporate network by using a VPN connection. You are unable to access websites on the Internet only when you are using the VPN connection. You need to ensure that you can access websites when connected to the corporate network. …

QUESTION 191 You connect a portable Windows 8.1 computer to a corporate network by using a VPN connection. You are unable to access websites on the Internet only when you are using the VPN connection. You need to ensure that you can access websites when connected to the corporate network. …

QUESTION 181 A company has a Microsoft Software Assurance with Volume Licensing agreement. All client computers run Windows 8.1. An employee updates a device driver on his computer and then restarts the computer. Windows does not start successfully. You establish that the updated driver is the cause of the problem. …